Техническая информация
- [<HKLM>\SOFTWARE\Classes\WINK File\shell\open\command] '' = '%PROGRAM_FILES%\dialers\dmc\dmc.exe %1'
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'DMC' = '%PROGRAM_FILES%\dialers\dmc\dmc.exe /noconnect'
- '%PROGRAM_FILES%\dialers\dmc\dmc.exe' -kill <Полный путь к вирусу> /install
- '<SYSTEM32>\regsvr32.exe' /s /u <SYSTEM32>\MimeCheck2.dll
- '<SYSTEM32>\regsvr32.exe' /s /u <SYSTEM32>\MimeCheck.dll
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\getclientid[1]
- %TEMP%\WNK1.tmp
- %TEMP%\WNK2.tmp
- %HOMEPATH%\Desktop\DateMatchCentral1.url
- %PROGRAM_FILES%\dialers\dmc\dmc.exe
- <SYSTEM32>\DMC-uninstall.exe
- %PROGRAM_FILES%\dialers\links\Link01.ico
- %TEMP%\WNK2.tmp
- %TEMP%\WNK1.tmp
- '20#.#77.92.204':80
- 'localhost':1037
- 20#.#77.92.204/w/getclientid?sr##################
- ClassName: '(null)' WindowName: 'DMC'
- ClassName: 'DMC' WindowName: '(null)'